Sulaimon, 2012 - Google Patents
Network securitySulaimon, 2012
View PDF- Document ID
- 6217080611964980352
- Author
- Sulaimon A
- Publication year
External Links
Snippet
The rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no …
- 230000000116 mitigating 0 abstract description 44
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20100043066A1 (en) | Multiple security layers for time-based network admission control | |
Abdelghani | Implementation of defense in depth strategy to secure industrial control system in critical infrastructures | |
Alabady | Design and Implementation of a Network Security Model for Cooperative Network. | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
Sadiqui | Computer network security | |
Singh et al. | CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) | |
Funmilola et al. | Review of Computer Network Security System | |
Karamagi | Comptia Security+ Practice Exams | |
Sulaimon | Network security | |
Mohseni | Network Security for Small Businesses | |
Kule et al. | Design of effectively efficient techniques for circumvent wireless network security threats and attacks | |
Haji et al. | Practical security strategy for SCADA automation systems and networks | |
Gibson | Comptia Security+: get certified get ahead | |
Mbah | Bachelor’s Thesis | |
Ali et al. | Design and implementation of a secured remotely administrated network | |
Rayjada et al. | Analytical Research of Data Center Security Implementations and Cyber Attacks | |
Patel | Computer Network Security System | |
Davis | Constructing and Probing a Fortified Network | |
Sarvepalli | Designing Network Security Labs | |
Sarjiyus et al. | Simulation of an Enhanced Network Security Framework for Federal Polytechnic Mubi | |
BALEMI | BULE HORA UNIVERSIRTY | |
Groen | Silent Sabotage: Identifying and Preventing Cyber Attacks from Inside Actors | |
Μπαξεβάνος | Protecting with network security strategies a medium size enterprise and implementing scenarios attacks and countermeasures on cisco equipment | |
Floyd | The Changing Face of Network Security Threats | |
MAREȘ | Solutions to Secure a Network |